首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   118篇
  免费   0篇
各国政治   2篇
世界政治   1篇
法律   44篇
中国政治   7篇
政治理论   1篇
综合类   63篇
  2022年   1篇
  2021年   2篇
  2019年   3篇
  2018年   2篇
  2016年   1篇
  2015年   1篇
  2014年   8篇
  2013年   6篇
  2012年   1篇
  2011年   10篇
  2010年   2篇
  2009年   7篇
  2008年   11篇
  2007年   11篇
  2006年   10篇
  2005年   5篇
  2004年   9篇
  2003年   9篇
  2002年   4篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
  1997年   1篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
排序方式: 共有118条查询结果,搜索用时 15 毫秒
81.
大鼠实验性脑挫伤后不同时间脑apoE的表达   总被引:2,自引:0,他引:2  
目的观察大鼠实验性脑挫伤后脑内apoE蛋白变化的时空性规律。方法采用自由落体撞击法致大鼠脑挫伤模型,观察伤后不同时间(0.5h、2h、6h、12h、24h、3d、7d、14d)apoE蛋白的变化,并用计算机图像分析技术作定量统计分析。结果伤后0.5h组脑皮质神经元apoE出现阳性表达,3d达到高峰,随后下降;伤后0.5h组在海马出现apoE强阳性反应,CA1区在伤后3d达到高峰,而CA2~CA4区在24h达到高峰,随后逐渐下降,伤后海马apoE表达以CA1区最强。结论挫伤后apoE时空性变化规律可作为脑损伤时间推断、早期诊断及生前伤和死后伤鉴别的一个新的参考指标。  相似文献   
82.
随着信息技术的高速发展 ,培养既精通计算机应用技术又懂得公安业务的复合型高素质人才 ,已成为公安院校教学改革的当务之急。为了更好地开展计算机应用专业的教学 ,应将公安系统对计算机应用专业人才的需求状况进行预测分析 ,以确保正确的教学方向。  相似文献   
83.
电子商务合同的订立程序、书面形式和签字确认等问题与传统合同制度有很多不同 ,如何建立和完善电子商务合同相关立法是当前急需研究解决的法律课题 ,本文即对这一问题进行研究 ,指出应在我国合同法中增加电子商务合同的相关规定。  相似文献   
84.
本文结合辽宁警专目前计算机实验教学的实际状况和计算机实验教学改革的一些尝试,对如何充分发挥新建计算机实验室的作用,进一步规范计算机实验教学内容、改革实验课考核方式、充分发挥学生在实验教学和管理中的作用等问题进行了思考与探讨。  相似文献   
85.
Memory analysis has gained popularity in recent years proving to be an effective technique for uncovering malware in compromised computer systems. The process of memory acquisition presents unique evidentiary challenges since many acquisition techniques require code to be run on a potential compromised system, presenting an avenue for anti-forensic subversion. In this paper, we examine a number of simple anti-forensic techniques and test a representative sample of current commercial and free memory acquisition tools. We find that current tools are not resilient to very simple anti-forensic measures. We present a novel memory acquisition technique, based on direct page table manipulation and PCI hardware introspection, without relying on operating system facilities - making it more difficult to subvert. We then evaluate this technique's further vulnerability to subversion by considering more advanced anti-forensic attacks.  相似文献   
86.
M.  J.  D. 《Computer Law & Security Report》2009,25(4):372-376
The undertaking of e-mail investigations was previously limited mainly to law enforcement agencies. However, UK organisations are increasingly undertaking e-mail investigation activities for incidents such as fraud, accessing or distributing indecent images and harassment amongst others. Organisations are also increasingly using computer forensic analysts to search through e-mail archives in order to gather evidence relating to e-mail misuse. In this paper we examine the legal aspects of UK corporate e-mail investigations.  相似文献   
87.

This article constitutes an attempt to describe the nature of IT-related crime and how it is likely to evolve in the future. By means of a number of empirical studies, the authors have attempted to estimate the prevalence of a number of different IT-related incidents and offences in Sweden during the period 1997-1998. The article shows that IT-related crime consists to a large extent of less serious offences. One might say that everyday crime has expanded into a new technological environment. Parts of the study nonetheless indicate that there are more serious IT-related offences being committed. In this regard the authors' focus is on offences related to the most valuable commodity in modern society, information. On the basis of the empirical studies, two different developmental patterns are identified; the first of these involves everything carrying on much the same as before, with no real evidence of any radical shift taking place; the second involves society going through a period of relatively comprehensive structural and technological change, which in turn is creating new and dangerous opportunity structures for crime.  相似文献   
88.
89.
In this paper we examine the legal aspects of the forensic investigation of peer-to-peer networks. Organisations may encounter instances where employees have used peer-to-peer software for a variety of types of computer misuse including the dissemination of copyrighted materials or indecent images, or instances where peer-to-peer software has been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer-to-peer networks.  相似文献   
90.
计算机网络攻击在技术上已经具备实战价值,引起各国的重视;但它的匿名性、跨国性和非对称性等特点,以及随之而来的网络军备竞赛,对各国的网络安全构成严峻的挑战。现行国际法所存在的空白、盲点,有可能导致网络战和计算机网络攻击的滥用。为防止网络战争的发生,国际社会有必要运用法律手段来规制计算机网络攻击。而鉴于达成具有普遍约束力的法律文件尚有难度,可尝试先通过外交声明之类的"软法"文件,来汇聚共识,形成合力。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号